0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (99)
  • R500+ (1,352)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Chaos-based Cryptography - Theory, Algorithms and Applications (Hardcover, Edition.): Ljupco Kocarev, Shiguo Lian Chaos-based Cryptography - Theory, Algorithms and Applications (Hardcover, Edition.)
Ljupco Kocarev, Shiguo Lian
R4,306 Discovery Miles 43 060 Ships in 10 - 15 working days

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.

Enemy at the Water Cooler - True Stories of Insider Threats and Enterprise Security Management Countermeasures (Paperback):... Enemy at the Water Cooler - True Stories of Insider Threats and Enterprise Security Management Countermeasures (Paperback)
Brian T Contos
R1,459 Discovery Miles 14 590 Ships in 12 - 17 working days

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level.
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization's building or networks that possesses some level of trust.
* Full coverage of this hot topic for virtually every global 5000 organization, government agency, and individual interested in security.
* Brian Contos is the Chief Security Officer for one of the most well known, profitable and respected security software companies in the U.S.-ArcSight.

Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.): Sokratis Katsikas Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.)
Sokratis Katsikas
R4,331 Discovery Miles 43 310 Ships in 12 - 17 working days

This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. The book aims to cover the subject of Communications and Multimedia Systems Security, as fully as possible. It constitutes an essential reading for information technology security specialists; computer professionals; communication systems professionals; EDP managers; EDP auditors; managers, researchers and students working on the subject.

Computer and Network Security Essentials (Hardcover, 1st ed. 2018): Kevin Daimi Computer and Network Security Essentials (Hardcover, 1st ed. 2018)
Kevin Daimi; Contributions by Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh
R5,134 Discovery Miles 51 340 Ships in 10 - 15 working days

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book's website at Springer.com.

Hardware IP Security and Trust (Hardcover, 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor Hardware IP Security and Trust (Hardcover, 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R4,415 Discovery Miles 44 150 Ships in 12 - 17 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs)... The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs) (Hardcover)
Alex Caine, Matthew Thrush
R688 Discovery Miles 6 880 Ships in 12 - 17 working days
World Conference on Computers in Education VI - WCCE '95 Liberating the Learner, Proceedings of the sixth IFIP World... World Conference on Computers in Education VI - WCCE '95 Liberating the Learner, Proceedings of the sixth IFIP World Conference on Computers in Education, 1995 (Hardcover, 1995 ed.)
David Tinsley, Tom J. Van Weert
R8,201 Discovery Miles 82 010 Ships in 12 - 17 working days

In this book about a hundred papers are presented. These were selected from over 450 papers submitted to WCCE95. The papers are of high quality and cover many aspects of computers in education. Within the overall theme of "Liberating the learner" the papers cover the following main conference themes: Accreditation, Artificial Intelligence, Costing, Developing Countries, Distance Learning, Equity Issues, Evaluation (Formative and Summative), Flexible Learning, Implications, Informatics as Study Topic, Information Technology, Infrastructure, Integration, Knowledge as a Resource, Learner Centred Learning, Methodologies, National Policies, Resources, Social Issues, Software, Teacher Education, Tutoring, Visions. Also included are papers from the chairpersons of the six IFIP Working Groups on education (elementary/primary education, secondary education, university education, vocational education and training, research on educational applications and distance learning). In these papers the work in the groups is explained and a basis is given for the work of Professional Groups during the world conference. In the Professional Groups experts share their experience and expertise with other expert practitioners and contribute to a postconference report which will determine future actions of IFIP with respect to education. J. David Tinsley J. van Weert Tom Editors Acknowledgement The editors wish to thank Deryn Watson of Kings College London for organizing the paper reviewing process. The editors also wish to thank the School of Informatics, Faculty of Mathematics and Informatics of the Catholic University of Nijmegen for its support in the production of this document.

Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)... Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000) (Hardcover, Reprinted from DISTRIBUTED AND PARALLEL DATABASES, 8:1, 2000)
Vijay Atluri, Pierangela Samarati
R2,870 Discovery Miles 28 700 Ships in 10 - 15 working days

Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,997 R1,821 Discovery Miles 18 210 Save R1,176 (39%) Ships in 12 - 17 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,305 Discovery Miles 43 050 Ships in 12 - 17 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Risk Management Processes for Software Engineering Models (Hardcover): Marian Myerson Risk Management Processes for Software Engineering Models (Hardcover)
Marian Myerson
R2,087 Discovery Miles 20 870 Ships in 10 - 15 working days

Learn how applying risk management to each stage of the software engineering model can help the entire development process run on time and on budget. This practical guide identifies the potential threats associated with software development, explains how to establish an effective risk management program, and details the six critical steps involved in applying the process. It also explores the pros and cons of software and organizational maturity, discusses various software metrics approaches you can use to measure software quality, and highlights procedures for implementing a successful metrics program.

Cryptographic Methods (Hardcover): Abdul Razaque, Fathi Amsaad, Abrar Alajlan Cryptographic Methods (Hardcover)
Abdul Razaque, Fathi Amsaad, Abrar Alajlan
R1,394 Discovery Miles 13 940 Ships in 10 - 15 working days
Cryptographic Applications of Analytic Number Theory - Complexity Lower Bounds and Pseudorandomness (Hardcover, 2003 ed.): Igor... Cryptographic Applications of Analytic Number Theory - Complexity Lower Bounds and Pseudorandomness (Hardcover, 2003 ed.)
Igor Shparlinski
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

The book introduces new techniques that imply rigorous lower bounds on the com plexity of some number-theoretic and cryptographic problems. It also establishes certain attractive pseudorandom properties of various cryptographic primitives. These methods and techniques are based on bounds of character sums and num bers of solutions of some polynomial equations over finite fields and residue rings. Other number theoretic techniques such as sieve methods and lattice reduction algorithms are used as well. The book also contains a number of open problems and proposals for further research. The emphasis is on obtaining unconditional rigorously proved statements. The bright side of this approach is that the results do not depend on any assumptions or conjectures. On the downside, the results are much weaker than those which are widely believed to be true. We obtain several lower bounds, exponential in terms of logp, on the degrees and orders of o polynomials; o algebraic functions; o Boolean functions; o linear recurrence sequences; coinciding with values of the discrete logarithm modulo a prime p at sufficiently many points (the number of points can be as small as pI/2+O: ). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the rightmost bit of the discrete logarithm and defines whether the argument is a quadratic residue."

Computational Algorithms for Fingerprint Recognition (Hardcover, 2004 ed.): Bir Bhanu, Xuejun Tan Computational Algorithms for Fingerprint Recognition (Hardcover, 2004 ed.)
Bir Bhanu, Xuejun Tan
R2,912 Discovery Miles 29 120 Ships in 10 - 15 working days

Biometrics such as fingerprint, face, gait, iris, voice and signature, recognizes one's identity using his/her physiological or behavioral characteristics. Among these biometric signs, fingerprint has been researched the longest period of time, and shows the most promising future in real-world applications. However, because of the complex distortions among the different impressions of the same finger, fingerprint recognition is still a challenging problem.

Computational Algorithms for Fingerprint Recognition presents an entire range of novel computational algorithms for fingerprint recognition. These include feature extraction, indexing, matching, classification, and performance prediction/validation methods, which have been compared with state-of-art algorithms and found to be effective and efficient on real-world data. All the algorithms have been evaluated on NIST-4 database from National Institute of Standards and Technology (NIST). Specific algorithms addressed include:
-Learned template based minutiae extraction algorithm,
-Triplets of minutiae based fingerprint indexing algorithm,
-Genetic algorithm based fingerprint matching algorithm,
-Genetic programming based feature learning algorithm for fingerprint classification,
-Comparison of classification and indexing based approaches for identification,
-Fundamental fingerprint matching performance prediction analysis and its validation.

Computational Algorithms for Fingerprint Recognition is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science and engineering.

Applications of Data Mining in Computer Security (Hardcover, 2002 ed.): Daniel Barbara, Sushil Jajodia Applications of Data Mining in Computer Security (Hardcover, 2002 ed.)
Daniel Barbara, Sushil Jajodia
R2,945 Discovery Miles 29 450 Ships in 10 - 15 working days

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security.

Applications Of Data Mining In Computer Security concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence.

Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016): Edward J M Colbert, Alexander Kott Cyber-security of SCADA and Other Industrial Control Systems (Hardcover, 1st ed. 2016)
Edward J M Colbert, Alexander Kott
R3,730 R2,689 Discovery Miles 26 890 Save R1,041 (28%) Ships in 12 - 17 working days

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.): Joachim Biskup Security in Computing Systems - Challenges, Approaches and Solutions (Hardcover, 2009 ed.)
Joachim Biskup
R4,317 Discovery Miles 43 170 Ships in 12 - 17 working days

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, "computing" refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.): Messaoud Benantar Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.)
Messaoud Benantar
R2,949 Discovery Miles 29 490 Ships in 10 - 15 working days

Access control is a method of allowing and disallowing certain operations on a computer or network system. This book details access control mechanisms that are emerging with the latest Internet programming technologies. It provides a thorough introduction to the foundations of programming systems security as well as the theory behind access control models. The author explores all models employed and describes how they work.

Cryptanalytic Attacks on RSA (Hardcover, 2008 ed.): Song Y. Yan Cryptanalytic Attacks on RSA (Hardcover, 2008 ed.)
Song Y. Yan
R2,814 Discovery Miles 28 140 Ships in 10 - 15 working days

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first, followed by an account of the RSA cryptographic system and its variants.

This book is also suitable as a secondary text for advanced-level students in computer science and mathematics.

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R2,925 Discovery Miles 29 250 Ships in 10 - 15 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced... Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom (Hardcover, 2000 ed.)
Josep Domingo-Ferrer, David Chan, Anthony Watson
R5,661 Discovery Miles 56 610 Ships in 10 - 15 working days

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May... Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece (Hardcover, 2003 ed.)
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
R3,091 Discovery Miles 30 910 Ships in 10 - 15 working days

In light of the rapidly escalating age of uncertainty in the IT security and privacy world, this book provides the professional IT community and, in particular, security and data protection experts and researchers, with a selection of state-of-the-art material on emerging technologies for IT security and privacy issues. Furthermore, the book analyzes the new security threats and vulnerabilities that appear in modern information societies.

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Networked RFID Systems and Lightweight Cryptography - Raising Barriers to Product Counterfeiting (Hardcover, Illustrated Ed):... Networked RFID Systems and Lightweight Cryptography - Raising Barriers to Product Counterfeiting (Hardcover, Illustrated Ed)
Peter H. Cole, Damith C. Ranasinghe
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

This book consists of a collection of works on utilizing the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID Labs around the globe. It assumes very little knowledge on the part of the reader on Networked RFID systems as the material provided in the introduction familiarizes the reader with concepts, underlying principles and vulnerabilities of modern RFID systems.

Security Engineering for Service-Oriented Architectures (Hardcover, 2009 ed.): Michael Hafner, Ruth Breu Security Engineering for Service-Oriented Architectures (Hardcover, 2009 ed.)
Michael Hafner, Ruth Breu
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

The growing popularity of Service Oriented Architectures is mainly due to business and technology trendsthat have crystallized over thepast decade. On the business side, companies struggle to survive in a competitive - vironment that pushes them towards a tighter integration into an industry's value chain, to outsource non core business operations or to constantly- engineer business processes. These challenges boosted the demand for sc- able IT-solutions, with e?orts ultimately resulting in a ?exible architectural paradigm - Service Oriented Architectures. On the technical side, middleware standards, technologies and archit- turesbasedonXMLand Webservicesaswellastheirsecurityextensionshave matured to a sound technology base that guarantees interoperability across enterprise and application boundaries - a prerequisite to inter-organizational applications and work?ows. While the principles and concepts of Service Oriented Architectures may lookevidentandcogentfromaconceptualperspective, therealizationofint- organizational work?ows and applications based on the paradigm "Service Oriented Architecture" remains a complex task, and, all the more when it comes to security, the implementation is still bound to low-level technical knowledgeandhence error-prone. The number of books and publications o?ering implementation-level c- erageofthetechnologies, standardsandspeci?cationsasrequiredbytechnical developers lookingfor guidance on how to"add"security to service oriented solutions based on Web services and XML technology is already considerable and ever growing. The present book sets a di?erent focus. Based on the p- adigmof Model Driven Security, it shows how to systematically designand realize security-critical applications for Service Oriented Architectures.

Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004): Neal Koblitz Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R4,945 Discovery Miles 49 450 Ships in 12 - 17 working days

This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R699 Discovery Miles 6 990
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390
Alice and Bob Learn Application Security
T Janca Paperback R849 Discovery Miles 8 490
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,183 Discovery Miles 11 830
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,728 Discovery Miles 27 280
Black Hat Physical Device Security…
Drew Miller Hardcover R1,479 Discovery Miles 14 790
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R2,977 Discovery Miles 29 770
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030

 

Partners